Static task
static1
Behavioral task
behavioral1
Sample
560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687.exe
Resource
win10v2004-20240802-en
General
-
Target
560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687
-
Size
3.4MB
-
MD5
06260a1a0922d3f8d5466031af481522
-
SHA1
834c673019c35b9cd33c73d0f441017a16668d7c
-
SHA256
560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687
-
SHA512
d4d71458ba4dc3afd3e0c8ef3215431d37cd4315f1bdde481ba889f626cce043e8c2b20ae98c09f0642bff001ea542634eb805075ee7ddf8c53c43c667b9e174
-
SSDEEP
49152:svef7dmXHkQz3jiEIUXyjfpVG0bVVMM+hvZm4gsmuHXLqbX9FGatvlmuWJ2B8BTg:sW4kuHyjm0bVVMBFZmqrHej99zmEQQ3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687
Files
-
560c9be8c7dd984074234bf60988acfff359716d64f2c3548b47dbab88263687.exe windows:6 windows x64 arch:x64
3b79c705dd745f80a7564e977d8b54b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlVirtualUnwind
kernel32
LeaveCriticalSection
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
UpdateWindow
GetProcessWindowStation
GetUserObjectInformationW
advapi32
CryptEncrypt
msvcp140
?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_47
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
wininet
InternetCloseHandle
crypt32
PFXImportCertStore
imm32
ImmSetCandidateWindow
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_errno
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-stdio-l1-1-0
_read
api-ms-win-crt-conio-l1-1-0
_getch
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-math-l1-1-0
floorf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
ws2_32
htonl
wldap32
ord46
normaliz
IdnToAscii
Sections
.text Size: - Virtual size: 703KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rwesfwe Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rwesfwe Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ